Corrigendum to "Trust-based security for wireless ad hoc and sensor networks" [Computer Communications 30 (2007) 2413-2427].
Azzedine BoukercheLi XuKhalil El-KhatibPublished in: Comput. Commun. (2007)
Keyphrases
- sensor networks
- wireless sensor
- network connectivity
- visual sensor networks
- wireless sensor networks
- resource constrained
- mobile wireless
- key establishment
- wireless video
- security mechanisms
- data gathering
- heterogeneous sensor networks
- wireless communication
- energy efficient
- mobile nodes
- sensor data
- multi hop
- environmental monitoring
- sensor nodes
- key management
- energy consumption
- wireless networks
- base station
- energy efficiency
- information security
- access control
- communication cost
- physical layer
- underwater acoustic
- wireless sensor nodes
- data streams
- computer systems
- security issues
- mobile sensor networks
- network security
- communication bandwidth
- communication networks
- network management
- mobile users
- data sets
- mobile ad hoc networks
- pairwise
- routing protocol
- communication systems
- data aggregation
- sensor web
- peer to peer
- image processing algorithms